Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag
Thomas Plos and Martin Feldhofer
Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010 Graz, Austria {Thomas.Plos,Martin.Feldhofer}@iaik.tugraz.at
Abstract. Radio-frequency identification (RFID) technology is the en- abler for the future Internet of Things (IoT) where security will play an important role. In this work, we evaluate the costs of adding different security-layer variants that are based on symmetric cryptography to a low-cost RFID tag. In contrast to related work, we do not only consider the costs of the cryptographic-algorithm implementation, but also the costs that relate to protocol handling of the security layer. Further we show that using a tag architecture based on a low-resource 8-bit micro- controller is highly advantageous. Such an approach is not only flexibility but also allows combining the implementation of protocol and crypto- graphic algorithm on the microcontroller. Expensive resources like mem- ory can be easily reused, lowering the overall hardware costs. We have synthesized the security-enabled tag for a 130 nm CMOS technology, us- ing the cryptographic algorithms AES and NOEKEON to demonstrate the effectiveness of our approach. Average power consumption of the mi-
crocontroller is 2 ñW at a clock frequency of 106 kHz. Hardware costs of the security-layer variants range from about 1100 GEs using NOEKEON to 4500 GEs using AES.
Keywords: Low-cost RFID tag, 8-bit microcontroller, AES, NOEKEON, security layer, low power consumption.
1 Introduction
Over the last years, radio-frequency identification (RFID) technology has found its way into many applications of our daily life. The integration of RFID func- tionality into the latest smart phones (e.g. Nexus S, Blackberry Bold 9900) emphasizes the relevance of this technology. An upcoming application that re- lies on RFID technology is the Internet of Things (IoT). The vision of the future IoT is that every object has communication capabilities by equipping it with
This work has been supported by the Austrian Government through the research program FIT-IT Trust in IT Systems under the Project Number 820843 (Project CRYPTA) and by the European Commission through the ICT programme under contract ICT-2007-216676 (ECRYPT II).
M. Rajarajan et al. (Eds.): SecureComm 2011, LNICST 96, pp. 426–435, 2012.